Re: [Congress] CONGRESS is about ready to go

Bob Briscoe <ietf@bobbriscoe.net> Tue, 28 February 2023 08:11 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: congress@ietfa.amsl.com
Delivered-To: congress@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CED83C151541 for <congress@ietfa.amsl.com>; Tue, 28 Feb 2023 00:11:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pIwOUNWHjnhx for <congress@ietfa.amsl.com>; Tue, 28 Feb 2023 00:11:25 -0800 (PST)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7355C14CF1D for <congress@ietf.org>; Tue, 28 Feb 2023 00:11:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=LIKWX7SEKspBby+CRipzRuAFcW4FltWAnoeKPnI6QJY=; b=s6BBAet6h0F7OwtW3nLWJlpToD EUg7haqNIxqdRcDhhzviEAVCe5Dna5E9qXrcNg1CMIefsPBRHqIiM6+/tf83D0694xcehKRLO5Mt4 E/r4Xo76vHqZlP7S8LwUanw/BI3T+3X3zWAaKPcMTG3ZVqHOZWba0CdfI3m06JhK2SRUBbuDHhpz8 +cGHw48Vt5+s0BB8X0DNt4DDjes/NLSf5JY9myf0v61XtC69W3JXeVMlszxGlXbbWv9BTwjIczFlQ JD9GGNbErFN5Sn5mYquBxgW8+dg2Sr2Yf+XQuD34/6MTSmp7ylFzlYN7iqfWHpmjSLfnbqczZPuNU 3lJ+x4tQ==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:39414 helo=[192.168.1.8]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.95) (envelope-from <ietf@bobbriscoe.net>) id 1pWv52-001AfM-H2; Tue, 28 Feb 2023 08:11:20 +0000
Message-ID: <0a4a6f97-cef5-d742-d9e0-2afb40db97f6@bobbriscoe.net>
Date: Tue, 28 Feb 2023 08:11:19 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1
Content-Language: en-GB
To: Christian Huitema <huitema@huitema.net>, Matt Mathis <mattmathis@measurementlab.net>, Martin Duke <martin.h.duke@gmail.com>
Cc: "congress@ietf.org" <congress@ietf.org>
References: <CAM4esxQwvo-QNiq_1PDx_z8RvxcJwrMdkb+GJLYJDYw6+_gO2g@mail.gmail.com> <71579EDF-5910-49E4-A76E-3291A133A533@gmail.com> <CAEsRLK_v50CjouSRga2_DQDXOi0rFUVHUGEtL9UJMt+UtnRAiA@mail.gmail.com> <f257f6db-c3c1-3ba4-b99f-cf141c0d90d5@bobbriscoe.net> <CAEsRLK_kdQPa=J3hktfPJ5z5GsFMFAMvDo=x9x-E9K-DmrXk-g@mail.gmail.com> <dac96aaf-f122-45b7-f1b3-aa6e01a3daaf@bobbriscoe.net> <CAEsRLK8CEiPZLW_4d3LmkQhOH0tkdMSkwXipW_K16qWG_66szA@mail.gmail.com> <2a140a2e-6718-f916-3409-9d9609ff7fd2@huitema.net> <9E543709-8879-4B88-81CA-38EEA17C5045@ericsson.com> <CAEsRLK9otD6ZG98o-qwOESF99F_3wn7eqJwXBcJWxekkMsdjgg@mail.gmail.com> <2D200F56-0053-4FB9-B446-BAEC2D518581@ericsson.com> <CAEsRLK8GoAv=mvxzpeyfKX01EeUQMLiPkkkAO=w89PAKmB_rPQ@mail.gmail.com> <CAEsRLK_kZhg68n0E5mGVm_JY+qsw_WaotjLMQebt8g4Du41TmA@mail.gmail.com> <CAM4esxTgFZJct=C5BGbXn0U=9UNnNsa3kV4dJtkk-pGttT8cmw@mail.gmail.com> <CAEsRLK8WN4yHXTSVQ18hVzj08-wkAespHq8zumXH0USO1LEuog@mail.gmail.com> <bdf296ac-e727-d8e5-d604-26d92a627ece@huitema.net>
From: Bob Briscoe <ietf@bobbriscoe.net>
In-Reply-To: <bdf296ac-e727-d8e5-d604-26d92a627ece@huitema.net>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/congress/e3tznfJ4m4YqEb6Z-meaPm3oGbw>
Subject: Re: [Congress] CONGRESS is about ready to go
X-BeenThere: congress@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussions about the CONGestion RESponse and Signaling \(CONGRESS\) Working Group" <congress.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/congress>, <mailto:congress-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/congress/>
List-Post: <mailto:congress@ietf.org>
List-Help: <mailto:congress-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/congress>, <mailto:congress-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Feb 2023 08:11:29 -0000

+1 on all 4 paras of Christian's email.

To address the Diminishing Feedback problem when trying to get up to 
speed, you need /less/ ACK thinning. {Note 1}
However, once up to speed, /more/ ACK thinning is needed in cases where 
the reverse path is the bottleneck.
So the Diminishing Feedback problem and the ACK thinning problem are not 
the same problem.



Bob

{Note 1}:
* A Linux TCP receiver includes a heuristic to disable delayed ACK every 
2 packets (quick-ACK) until it detects the end of slow-start.
* To improve on this, we were sending packets with variable inter-packet 
intervals to detect the onset of queuing delay without growing a 
persistent queue.
* This confused the Linux receiver's heuristic. But we got much better 
results in tests where we manually disabled delayed ACK every 2 packets 
on the receiver.
* That experience told me that a receiver heuristic that assumes the 
sender is using slow-start has ossified the slow-start algorithm into 
Linux TCP.
* This motivated me to push for a protocol option so the sender can ask 
the receiver to alter its ACK rate - in the tcpm and quic WGs - which 
Christian points to.

On 28/02/2023 04:29, Christian Huitema wrote:
> Matt,
>
> It is not obvious to me that the "diminishing Feedback" problem 
> studied by Welzl & al. is related to ACK thinning. Succinctly, they 
> are arguing that a majority of flows are too short lived to be able to 
> measure network bandwidth using end to end mechanism, that this leads 
> to under-using the network capacity, that the problem is not amenable 
> to end to end solutions, and that any solution will have to involve 
> signalling by the network to the transport. I don't see any direct 
> relation between that line of reasoning and a discussion of whether we 
> should send one ACK per RTT, or 4, or one ACK for 2 packets.
>
> The discussion of ACK thinning is well advanced in the QUIC WG, see: 
> https://www.ietf.org/archive/id/draft-ietf-quic-ack-frequency-02.html. 
> (The authors have left the draft expire, but this is very much an 
> active discussion.) The draft is already implemented and deployed in 
> multiple QUIC stacks -- typically aiming for 4 ACKs per RTT, but the 
> actual draft does not say that.
>
> We may discuss whether such mechanisms should be developed in 
> Congress, or whether they belong in the respective transport groups. 
> They impact multiple mechanisms -- the QUIC draft mentions congestion 
> control, burst mitigation, lost detection and connection migration. 
> Congress could certainly provide guidelines on the impact of delayed 
> ACKs (or ACK thinning) on congestion control, and probably also for 
> burst control. But issues like loss detection or connection migration 
> are probably better dealt with in the specific transport group.
>
> I think we need some reasonable boundaries between Congress and 
> transport specific groups like TCPM or QUIC.
>
> -- Christian Huitema
>
> On 2/27/2023 4:59 PM, Matt Mathis wrote:
>> Yes, technically ACK thinning is a TCP only issue.   However the 
>> diminishing feedback problem [1] strikes all protocols, and 
>> implicitly defines the limits of desirable properties such as 
>> freedom from starvation and any form of fairness.    ACK decimation 
>> makes the problem much worse, and somebody in the transport area 
>> needs to give advice to link designers to put limits on ACK 
>> thinning.    We can decide that tcpm is the right place for such a 
>> document, however doing it there will separate the discussion about 
>> TCP from any broader conversation in congress about the general 
>> problem of diminishing feedback.
>>
>> (BTW, although I agree with the problem statement, I don't agree with 
>> their conclusion)
>> [1] Future Internet Congestion Control: The Diminishing Feedback Problem
>> Michael Welzl, Peyman Teymoori, Safiqul Islam, David Hutchison, Stein 
>> Gjessing
>> https://arxiv.org/abs/2206.06642 <https://arxiv.org/abs/2206.06642>
>>
>> On Sun, Feb 26, 2023 at 1:30 PM Martin Duke <martin.h.duke@gmail.com 
>> <mailto:martin.h.duke@gmail.com>> wrote:
>>
>>     I'm comfortable with adding these two bullets as being in-scope:
>>
>>     - Congestion control techniques that address lower-layer alterations
>>     to packet timing or ordering.
>>
>>     - Advice to upper layers on counterproductive behaviors regarding
>>     retransmissions and opening of additional connections to the same 
>> host.
>>
>>     As for ACK thinning, this strikes me as a TCP-only problem, and a
>>     standalone solution should probably be done in TCPM. That isn't to
>>     say that a more comprehensive algorithm couldn't touch on these
>>     issues as part of their design, which wouldn't require a separate
>>     charter bullet.
>>
>>     I'm happy to create a PR for this on Monday, when I have a decent
>>     text editor and github client. But I'm happy to entertain feedback.
>>
>>
>>
>>     On Fri, Feb 24, 2023 at 2:45 PM Matt Mathis
>>     <mattmathis@measurementlab.net
>>     <mailto:mattmathis@measurementlab.net>> wrote:
>>
>>         I just realized that the charter I have is .txt only. Did I
>>         overlook one in kramdown?
>>
>>         On Fri, Feb 24, 2023 at 11:30 AM Matt Mathis
>>         <mattmathis@measurementlab.net
>>         <mailto:mattmathis@measurementlab.net>> wrote:
>>
>>             You can't weigh fuzzy preferences in email, because the
>>             effort to send a message exceeds the strength of most
>>             people's opinion.
>>
>>             I think the chairs (+ ADs?) just need to make a decision. 
>>               I have some meetings but I will push two separate PRs laer
>>             today.
>>
>>             On Fri, Feb 24, 2023 at 10:31 AM Zaheduzzaman Sarker
>>             <zaheduzzaman.sarker@ericsson.com
>>             <mailto:zaheduzzaman.sarker@ericsson.com>> wrote:
>>
>>                 yes, a PR would be good.
>>
>>                 However, I am not sure we have a conclusive discussion
>>                 here that shows what it actually means if we include
>>                 those two bullets. I would like to understand that part
>>                 better.
>>
>>                 Let me remind us that right now the charter includes
>>                 "operational guidance" in the charter, is that not good
>>                 enough?
>>
>>                 //Zahed
>>
>>>                 On 24 Feb 2023, at 15:49, Matt Mathis
>>>                 <mattmathis@measurementlab.net
>>> <mailto:mattmathis@measurementlab.net>> wrote:
>>>
>>>                 I submitted two bullets that could go directly into
>>>                 the charter.   Would you like a PR?
>>>
>>>                 Although it is reasonable to assume that we have views
>>>                 up and down the stack, I hoped to make them explicit
>>>                 for two reasons:
>>>                 1) We tend to forget to think about some of these
>>>                 things, and I was hoping to have 
>>> permanent reminders.                 (For example, how much has L4s 
>>> and TCP Prague been
>>>                 tested on networks that require batching, such as 600
>>>                 Mb/s WiFi? I have yet to see any mention of potential
>>>                 problems (Please let me know if I have missed 
>>> something).
>>>                 2) I have seen good ideas ruled "out of scope" because
>>>                 they were not explicitly in scope, and raised an
>>>                 awkward truth that the WG didn't want to address.
>>>
>>>                 Of my two points, I see more risk down the stack.
>>>
>>>                 On Fri, Feb 24, 2023 at 2:55 AM Zaheduzzaman Sarker
>>>                 <zaheduzzaman.sarker@ericsson.com
>>> <mailto:zaheduzzaman.sarker@ericsson.com>> wrote:
>>>
>>>                     First a  question, Have we reached to any
>>>                     actionable modification to the charter text after
>>>                     the discussion here?
>>>
>>>                     On my personal view, I think the relation to lower
>>>                     layer and upper layer is always there. We have
>>>                     applications that produces and consumes data not
>>>                     really focusing on how a transport protocol would
>>>                     behave or require rather focused on their own KPIs
>>>                     or goal. We also have lower layer which try to do
>>>                     optimization - say ordered delivery, which perhaps
>>>                     transport protocol can handle themself. For me,
>>>                     all these are very good topics to discuss and
>>>                     consider while designing on congestion control
>>>                     algorithms , but does not need to be in the
>>>                     charter. I am not sure what else can be done other
>>>                     than publishing BCP or guidance. The 5033bis
>>>                     perhaps would also trigger some of these 
>>> discussions.
>>>
>>>                     //Zahed
>>>
>>>                     > On 24 Feb 2023, at 04:23, Christian Huitema
>>>                     <huitema@huitema.net <mailto:huitema@huitema.net>>
>>>                     wrote:
>>>                     >
>>>                     >
>>>                     >
>>>                     > On 2/23/2023 5:14 PM, Matt Mathis wrote:
>>>                     >> I should have used a different word.  I meant
>>>                     tools in a BCP standards sense - a citable
>>>                     document that can be used to scold developers and
>>>                     corporations  who carelessly deploy large scale
>>>                     systems that are capable of serving enough data to
>>>                     DDOS entire countries.   I have heard rumors of at
>>>                     least 3 such events.
>>>                     >> It would be better if we told application
>>>                     designers that they MUST do their part to prevent
>>>                     congestion collapse and that transport can't fix
>>>                     some design flaws.
>>>                     >
>>>                     > Of course, we have no protocol police. For
>>>                     example, nobody asked permission from the IETF to
>>>                     deploy Cubic and make the buffer-bloat issue even
>>>                     bigger than it was with Reno. Nobody asked for
>>>                     permission from the IETF before deciding that
>>>                     running 6 TCP connections in parallel was a fine
>>>                     way to speed up the loading of web pages.
>>>                     >
>>>                     > In theory, we could encourage "enforcement by
>>>                     network effects". For example, servers could
>>>                     (perhaps) detect that a peer is requesting way too
>>>                     many TCP connections in parallel, or stopping and
>>>                     resuming its QUIC connections too frequently, and
>>>                     "do something about it". Or, Active Queue Managers
>>>                     in the network might detect that a particular flow
>>>                     is causing congestion or long queues at the
>>>                     bottleneck and "do something about it".
>>>                     >
>>>                     > That's something worth thinking about. A BCP
>>>                     might detail the kind of enforcement that is
>>>                     considered legit, providing servers admin or AQM
>>>                     system with some kind of guidelines. And then, the
>>>                     resulting enforcement might make the Internet
>>>                     better for everybody. Maybe.
>>>                     >
>>>                     > It is also a clear recipe for ossification.
>>>                     That, and the possibility of getting it wrong,
>>>                     make writing any such recommendation rather
>>>                     dangerous. Not that this has ever stopped the
>>>                     deployment of middle boxes...
>>>                     >
>>>                     > -- Christian Huitema
>>>                     >
>>>                     > --
>>>                     > Congress mailing list
>>>                     > Congress@ietf.org <mailto:Congress@ietf.org>
>>>                     > https://www.ietf.org/mailman/listinfo/congress
>>> <https://www.ietf.org/mailman/listinfo/congress>
>>>
>>>
>>>
>>>                 --                 Thanks,
>>>                 --MM--
>>>                 Evil is defined by mortals who think they know "The
>>>                 Truth" and use force to apply it to others.
>>
>>
>>
>>             --             Thanks,
>>             --MM--
>>             Evil is defined by mortals who think they know "The Truth"
>>             and use force to apply it to others.
>>
>>
>>
>>         --         Thanks,
>>         --MM--
>>         Evil is defined by mortals who think they know "The Truth" and
>>         use force to apply it to others.
>>
>>
>>
>> -- 
>> Thanks,
>> --MM--
>> Evil is defined by mortals who think they know "The Truth" and use 
>> force to apply it to others.
>>
>

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/